Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Phase I - Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area. You will then identify potential security weaknesses.

Security weaknesses - You must choose two from the following three areas (hardware, software, and policy - excluding password policies) and identify an item that requires improved security.

To define the asset or policy with sufficient detail to justify your assessment, your assessment must include:

* the vulnerability associated with the asset or policy
* the possible threats against the asset or policy
* the likelihood that the threat will occur (risk)
* the consequences to mission critical business processes should the threat occur
* how the organization's competitive edge will be affected should the threat occur

To clarify an item that requires improved security, you must identify one of these items:

* one hardware and one software weakness
* one hardware and one policy weakness
* one software and one policy weakness

Other required elements include:

* Cover sheet
* APA-style
* In-text citations and Reference section
* Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.

Phase II: the Course Project (comprised of Phase I and II) - Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company

In this phase of the project you will include Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.

Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor and major specifications, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Justification - You must address the efficacy of the solution in terms of the identified threats and vulnerabilities; the cost of the solution, including its purchase (if applicable); and its implementation, including training and maintenance.

Impact on business processes - You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.

Other required elements include:

* Cover sheet
* APA-style
* In-text citations and Reference section
* 5 reference minimum"  

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9641298

Have any Question?


Related Questions in Computer Engineering

Anz is offering a product that pays out 3000 quarterly from

ANZ is offering a product that pays out $3,000 quarterly from the end of Mar 2021 to the end of Dec 2030 with annual interest rate 6% compounded quarterly. (e.g. payment is made at the end of every March, June, September ...

You work in a veterinarians office and need to organize the

You work in a Veterinarian's office and need to organize the data on pets that you treat. In your database, you want to keep track of the following information: Customer information: Name Address City State ZIP Phone # Y ...

Question please assist with discussion questions please

Question: Please assist with discussion questions. Please answer following questions with at least 3 paragraph response. Thank you. Access control starts first with assessing risks so you can properly identify potential ...

A chemistry student needsnbsp600 mlnbspof carbon

A chemistry student needs 60.0 mL of carbon tetrachloride for an experiment. By consulting the  CRC Handbook of Chemistry and Physics , the student discovers that the density of carbon tetrachloride is 1.59 g.cm^-3. Calc ...

Subject economicsa manager has a utility function u c 05

Subject: Economics A manager has a utility function U = C 0.5 if she doesn't work hard and U = C 0.5 - 3 if she does. Expected profit will increase from 1,000 to 1,500 if she works hard. The manager receives compensation ...

Suppose that we reconsider our student example and the only

Suppose that we reconsider our STUDENT example and the only attributes of STUDENT are student number and name. Let us suppose that we have another entity called HIGH SCHOOL, that is going to be the high school from which ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

Question have you received emails like thesewhat actions if

Question : Have you received emails like these? What actions, if any, have you taken to limit the permissions of the sender? Why or why not? In your chapter reading, you learned about the CAN-SPAM law From your perspecti ...

Question research analyze and discuss the advantages and

Question : Research, analyze, and discuss the advantages and disadvantages of Web-based collaboration tools. Compare and contrast Google Apps and Microsoft SharePoint. The response must be typed, single spaced, must be i ...

Research the differences in file formats between ms office

Research the differences in file formats between MS Office 2003 and MS Office 2007. Explain how file signatures and metadata can be used to determine which versions of MS Office applications (e.g. Word, Excel, Power Poin ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As